CVSS Vector
CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:H/I:H/A:H
Lifecycle Timeline
3Tags
Description
A container privilege escalation flaw was found in certain OpenShift Update Service (OSUS) images. This issue stems from the /etc/passwd file being created with group-writable permissions during build time. In certain conditions, an attacker who can execute commands within an affected container, even as a non-root user, may be able to leverage their membership in the root group to modify the /etc/passwd file. This could allow the attacker to add a new user with any arbitrary UID, including UID 0, leading to full root privileges within the container.
Analysis
Privilege escalation in OpenShift Update Service (OSUS) container images allows local attackers with high privileges to gain root access by modifying the group-writable /etc/passwd file created during build time. An attacker executing commands within an affected container can leverage root group membership to inject a new user with UID 0, achieving full container root privileges. No public exploit code or active exploitation has been identified at the time of analysis.
Technical Context
This vulnerability exploits improper file permission configuration at container build time, rooted in CWE-276 (Incorrect Default Permissions). The /etc/passwd file, typically a critical system authentication database, was created with group-writable permissions during the OSUS image build process. In Linux containers, membership in the root group (GID 0) combined with group-write access to /etc/passwd enables arbitrary modification of user records without requiring root UID ownership. An attacker can append a new entry with UID 0 to escalate from their current privilege level to full root access, effectively breaking container isolation boundaries. The vulnerability affects Red Hat OpenShift Update Service (cpe:2.3:a:red_hat:red_hat_openshift_update_service:*:*:*:*:*:*:*:*) across affected versions.
Affected Products
Red Hat OpenShift Update Service (OSUS) across all versions matching the CPE cpe:2.3:a:red_hat:red_hat_openshift_update_service:*:*:*:*:*:*:*:* are affected. Specific affected versions were not enumerated in the available references. Users should consult the Red Hat Security Advisory at https://access.redhat.com/security/cve/CVE-2025-57854 and the associated Bugzilla tracker (https://bugzilla.redhat.com/show_bug.cgi?id=2391107) for the definitive list of impacted versions and fixed release versions.
Remediation
Apply the vendor-released patch from Red Hat for OpenShift Update Service; consult https://access.redhat.com/security/cve/CVE-2025-57854 for the specific patched version applicable to your deployment. The primary fix involves rebuilding affected OSUS container images with proper /etc/passwd file permissions (non-group-writable, typically 0644 or 0444). As an immediate workaround in container deployments, restrict group membership and ensure containers run with minimal privilege levels (non-root user, dropped capabilities) and enforce read-only root filesystems where feasible. Verify that container build processes enforce restrictive default file permissions and implement image scanning to detect group-writable critical system files in existing images.
Priority Score
Share
External POC / Exploit Code
Leaving vuln.today
EUVD-2025-209304